Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention.- Idea: Callee-Site Rewriting of Sealed System Libraries.- Towards Unified Authorization for Android.- Model-Based Usage Control Policy Derivation.- Compositional Verification of Application-Level Security Properties.- Towards Verifying Voter Privacy through Unlinkability.- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification.- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer.- DKAL: Constructing Executable Specifications of Authorization Protocols.- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services.- Idea: Writing Secure C Programs with SecProve.- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts.- An Empirical Study on the Effectiveness of Security Code Review.- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want